Cyber Threats
Cybersecurity Best Practices
Hospital Cybersecurity
Incident Response
Cybersecurity Policies
100

What is the most common method used by cyber attackers to gain access to hospital networks?

Phishing

100

What is the practice of regularly updating software to protect against vulnerabilities?

Patch Management

100

What type of data is most commonly targeted in hospital cyber attacks?

Patient Records

100

The first step in responding to a cybersecurity incident.

Identification

100

This policy outlines the acceptable use of hospital IT resources.

Acceptable Use Policy

200

This type of malware encrypts a victim's files and demands payment for the decryption key.

 Ransomware

200

 This security measure requires users to provide two forms of identification before accessing an account.

 Multi-Factor Authentication (MFA)

200

This act requires healthcare organizations to protect patient information and ensure data privacy.

HIPAA (Health Insurance Portability and Accountability Act)

200

The process of containing the impact of a cyber attack.

Containment

200

 A policy that defines how to handle and protect sensitive patient information.

 Data Privacy Policy

300

 A cyber attack that overwhelms a network with traffic, causing it to become unavailable.

DDoS Attack (Distributed Denial of Service)

300

The process of converting data into a code to prevent unauthorized access.

Encryption

300

A cybersecurity framework specifically designed for healthcare organizations.

HITRUST (Health Information Trust Alliance)

300

The step where the root cause of the incident is determined and eliminated.

 Eradication

300

This policy requires employees to report any suspicious activity or potential security breaches.

Incident Reporting Policy

400

This type of attack involves tricking individuals into revealing sensitive information by pretending to be a trustworthy entity.

 Social Engineering

400

A network security system that monitors and controls incoming and outgoing network traffic.

 Firewall

400

 The practice of regularly backing up data to ensure it can be restored in case of a cyber attack.

Data Backup

400

 The process of restoring systems to normal operation after a cyber attack.

Recovery

400

A policy that mandates regular training for staff on cybersecurity best practices.

Security Awareness Training Policy

500

A type of malware that disguises itself as legitimate software but performs malicious activities.

 Trojan Horse

500

The principle of giving users the minimum level of access necessary to perform their job functions.

Least Privilege

500

 A simulated cyber attack used to test the security of a hospital's systems.

 Penetration Testing

500

The final step in the incident response process, involving a review of the incident and lessons learned.

 Lessons Learned

500

 This policy outlines the procedures for responding to a cybersecurity incident.

 Incident Response Policy

M
e
n
u